Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

Refer to the exhibit. Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?A . R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0B ....

August 8, 2022 No Comments READ MORE +

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?A . ip access-list extended 10 deny tcp host 10.10.10.1 any eq 80 permit ip any anyB . ip access-list extended 200 deny tcp...

August 8, 2022 No Comments READ MORE +

What is the effect of this configuration?

Refer to the exhibit. What is the effect of this configuration?A . When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication failsB . The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+C...

August 8, 2022 No Comments READ MORE +

Which two operations are valid for RESTCONF? (Choose two.)

Which two operations are valid for RESTCONF? (Choose two.)A . HEADB . REMOVEC . PULLD . PATCHE . ADDF . PUSHView AnswerAnswer: AD Explanation: RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, DELETE.

August 8, 2022 No Comments READ MORE +

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....

August 8, 2022 No Comments READ MORE +

Based on the output, which action resolves this issue?

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?A . Configure less member ports on Switch2.B . Configure the same port channel interface number on both switchesC . Configure...

August 8, 2022 No Comments READ MORE +

What does the output confirm?

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration. What does the output confirm?A . The first pocket triggered NAT to add on entry to NAT tableB . R1 is configured with NAT overload parametersC . A Telnet from...

August 8, 2022 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

August 8, 2022 No Comments READ MORE +

Which JSON syntax is valid?

Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}B . {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])}C . {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}}D . {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }

August 8, 2022 No Comments READ MORE +

Which action reduces the user impact?

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs. Which action reduces the user impact?A . increase the AP heartbeat timeoutB . increase...

August 8, 2022 No Comments READ MORE +